CVE-2025-37995

Source
https://cve.org/CVERecord?id=CVE-2025-37995
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37995.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-37995
Downstream
Related
Published
2025-05-29T13:15:54.095Z
Modified
2026-03-20T12:42:36.780357Z
Summary
module: ensure that kobject_put() is safe for module type kobjects
Details

In the Linux kernel, the following vulnerability has been resolved:

module: ensure that kobject_put() is safe for module type kobjects

In 'lookuporcreatemodulekobject()', an internal kobject is created using 'modulektype'. So call to 'kobjectput()' on error handling path causes an attempt to use an uninitialized completion pointer in 'modulekobjectrelease()'. In this scenario, we just want to release kobject without an extra synchronization required for a regular module unloading process, so adding an extra check whether 'complete()' is actually required makes 'kobject_put()' safe.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37995.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
942e443127e928a5631c3d5102aca8c8b3c2dd98
Fixed
93799fb988757cdacf19acba57807746c00378e6
Fixed
a63d99873547d8b39eb2f6db79dd235761e7098a
Fixed
f1c71b4bd721a4ea21da408806964b10468623f2
Fixed
9e7b49ce4f9d0cb5b6e87db9e07a2fb9e754b0dd
Fixed
faa9059631d3491d699c69ecf512de9e1a3d6649
Fixed
d63851049f412cdfadaeef7a7eaef5031d11c1e9
Fixed
31d8df3f303c3ae9115230820977ef8c35c88808
Fixed
a6aeb739974ec73e5217c75a7c008a688d3d5cf1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37995.json"